Ports
Duration
Date
IP
Nmap scan report for pull-flv-l1-xg.bytecdn.cn (138.113.19.15) Host is up (0.034s latency). Not shown: 930 closed ports PORT STATE SERVICE VERSION 80/tcp open http nginx 81/tcp open http nginx 82/tcp open http nginx 85/tcp open http nginx 88/tcp open http nginx 89/tcp open http nginx 90/tcp open http nginx 443/tcp open ssl/http nginx |_http-cors: GET POST PUT DELETE OPTIONS | http-server-header: | Cdn Cache Server V2.0 |_ nginx |_http-title: 400 Bad Request | ssl-cert: Subject: commonName=*.bytecdn.cn | Subject Alternative Name: DNS:*.bytecdn.cn, DNS:bytecdn.cn | Not valid before: 2023-09-26T00:00:00 |_Not valid after: 2024-10-26T23:59:59 |_ssl-date: TLS randomness does not represent time | tls-alpn: |_ http/1.1 | tls-nextprotoneg: |_ http/1.1 801/tcp open http nginx |_http-server-header: nginx |_http-title: 400 Bad Request 843/tcp open unknown 1080/tcp open http nginx 1088/tcp open http nginx |_http-server-header: nginx |_http-title: 400 Bad Request 1089/tcp open http nginx |_http-server-header: nginx |_http-title: 400 Bad Request 1443/tcp open ssl/ies-lm? 1900/tcp open http nginx 1935/tcp open http nginx 2000/tcp open http nginx 2323/tcp open 3d-nfsd? | fingerprint-strings: | FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest, SIPOptions, TLSSessionReq: | HTTP/1.0 404 FAIL | Content-length:5 | Connection:Close |_ ERROR 2381/tcp open http nginx 2382/tcp open http nginx 2383/tcp open http nginx 3000/tcp open http nginx 4000/tcp open http nginx 5000/tcp open http nginx 5001/tcp open http nginx |_http-server-header: nginx |_http-title: 400 Bad Request 5002/tcp open http nginx 5566/tcp open http nginx 6666/tcp open irc? |_irc-info: Unable to open connection 7000/tcp open http nginx 7001/tcp open http nginx 7002/tcp open http nginx 7070/tcp open http nginx 7443/tcp open ssl/http nginx |_http-server-header: nginx |_http-title: 400 Bad Request | ssl-cert: Subject: commonName=default.chinanetcenter.com/organizationName=\xE7\xBD\x91\xE5\xAE\xBF\xE7\xA7\x91\xE6\x8A\x80\xE8\x82\xA1\xE4\xBB\xBD\xE6\x9C\x89\xE9\x99\x90\xE5\x85\xAC\xE5\x8F\xB8\xE5\x8E\xA6\xE9\x97\xA8\xE5\x88\x86\xE5\x85\xAC\xE5\x8F\xB8/stateOrProvinceName=\xE7\xA6\x8F\xE5\xBB\xBA\xE7\x9C\x81/countryName=CN | Subject Alternative Name: DNS:default.chinanetcenter.com, DNS:*.i3839.com, DNS:*.ourdvsss.com, DNS:*.ziroom.com, DNS:*.blued.com, DNS:sstatic.chunboimg.com, DNS:*.ip138.com, DNS:m.bbs.3839.com, DNS:microgame.5054399.net, DNS:nitrome.com.4399.com, DNS:s3.chunboimg.com, DNS:jssdk.3304399.net, DNS:*.lof3.xyz, DNS:*.rax0mai4.xyz, DNS:*.4399.cn, DNS:s0.chunboimg.com, DNS:*.3839.com, DNS:www.miniclip.com.4399pk.com, DNS:*.1zhe.com, DNS:ip138.com, DNS:d.3839app.net, DNS:maangh2.chinanetcenter.com, DNS:*.9k9.cn, DNS:*.4399.com, DNS:s1.chunboimg.com, DNS:cdn.h5wan.4399sj.com, DNS:*.service.kugou.com, DNS:lvs.lxdns.net, DNS:*.wscdns.com, DNS:*.walla-app.com, DNS:*.bldimg.com, DNS:*.5054399.com, DNS:*.4399youpai.com, DNS:*.3839app.com, DNS:*.v.cdn20.com, DNS:hls.vda.v.cdn20.com, DNS:*.cntv.cdn20.com, DNS:*.img4399.com, DNS:s2.chunboimg.com, DNS:*.cntv.lxdns.com, DNS:*.ourdvsssvip.com, DNS:*.v.wscdns.com, DNS:*.iwan4399.com, DNS:4399.cn | Not valid before: 2023-10-25T00:00:00 |_Not valid after: 2024-11-15T23:59:59 |_ssl-date: TLS randomness does not represent time | tls-alpn: |_ http/1.1 | tls-nextprotoneg: |_ http/1.1 7777/tcp open http nginx 8000/tcp open http nginx 8001/tcp open http nginx 8008/tcp open http nginx 8009/tcp open http nginx |_ajp-methods: Failed to get a valid response for the OPTION request 8010/tcp open http nginx 8011/tcp open http nginx 8022/tcp open http nginx 8080/tcp open http nginx 8081/tcp open http nginx 8082/tcp open http nginx 8083/tcp open http nginx 8084/tcp open http nginx 8085/tcp open http nginx 8088/tcp open http nginx 8089/tcp open http nginx 8090/tcp open http nginx 8443/tcp open ssl/http nginx |_http-cors: GET POST PUT DELETE OPTIONS |_http-server-header: nginx |_http-title: 400 Bad Request | ssl-cert: Subject: commonName=*.bytecdn.cn | Subject Alternative Name: DNS:*.bytecdn.cn, DNS:bytecdn.cn | Not valid before: 2023-09-26T00:00:00 |_Not valid after: 2024-10-26T23:59:59 |_ssl-date: TLS randomness does not represent time | tls-alpn: |_ http/1.1 | tls-nextprotoneg: |_ http/1.1 8888/tcp open http nginx 9000/tcp open http nginx 9001/tcp open http nginx 9002/tcp open http nginx 9080/tcp open http nginx 9081/tcp open http nginx 9090/tcp open http nginx 9091/tcp open http nginx 9099/tcp open http nginx 9100/tcp open jetdirect? 9101/tcp open jetdirect? 9103/tcp open jetdirect? 9200/tcp open http nginx |_http-server-header: nginx |_http-title: 400 Bad Request 9998/tcp open http nginx 9999/tcp open http nginx 11111/tcp open http nginx |_http-server-header: nginx |_http-title: 400 Bad Request 12000/tcp open http nginx |_http-server-header: nginx |_http-title: 400 Bad Request 19350/tcp open unknown 30000/tcp open http nginx 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port2323-TCP:V=7.70%I=7%D=11/19%Time=655A0EA5%P=x86_64-redhat-linux-gnu SF:%r(GetRequest,3E,"HTTP/1\.0\x20404\x20FAIL\r\nContent-length:5\r\nConne SF:ction:Close\r\n\r\nERROR")%r(HTTPOptions,3E,"HTTP/1\.0\x20404\x20FAIL\r SF:\nContent-length:5\r\nConnection:Close\r\n\r\nERROR")%r(RTSPRequest,3E, SF:"HTTP/1\.0\x20404\x20FAIL\r\nContent-length:5\r\nConnection:Close\r\n\r SF:\nERROR")%r(TLSSessionReq,3E,"HTTP/1\.0\x20404\x20FAIL\r\nContent-lengt SF:h:5\r\nConnection:Close\r\n\r\nERROR")%r(FourOhFourRequest,3E,"HTTP/1\. SF:0\x20404\x20FAIL\r\nContent-length:5\r\nConnection:Close\r\n\r\nERROR") SF:%r(SIPOptions,3E,"HTTP/1\.0\x20404\x20FAIL\r\nContent-length:5\r\nConne SF:ction:Close\r\n\r\nERROR"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port6666-TCP:V=7.70%I=7%D=11/19%Time=655A0EAC%P=x86_64-redhat-linux-gnu SF:%r(RPCCheck,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xf SF:f\xff\0\0\0\x07\x01\0\0\0")%r(SSLSessionReq,1C,"\x80\x03\0\x04\0\0\0\x1 SF:4\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0")%r(TLSSessio SF:nReq,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0 SF:\0\0\x07\x01\0\0\0")%r(Kerberos,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\ SF:0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0")%r(SMBProgNeg,1C,"\x80\x SF:03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\ SF:0\0")%r(X11Probe,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\x SF:ff\xff\xff\0\0\0\x07\x01\0\0\0")%r(TerminalServer,1C,"\x80\x03\0\x04\0\ SF:0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0")%r(Not SF:esRPC,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\ SF:0\0\0\x07\x01\0\0\0")%r(WMSRequest,1C,"\x80\x03\0\x04\0\0\0\x14\0\0\0\x SF:02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0")%r(afp,1C,"\x80\x03\0 SF:\x04\0\0\0\x14\0\0\0\x02\0\0\0\x04\x7f\xff\xff\xff\0\0\0\x07\x01\0\0\0" SF:); Device type: phone|general purpose|WAP|firewall|media device|specialized Running (JUST GUESSING): Google Android 7.X (96%), Linux 3.X|2.6.X|4.X (96%), IPCop 2.X (87%), Tiandy embedded (87%), AVtech embedded (87%) OS CPE: cpe:/o:google:android:7.1.2 cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3.0 cpe:/o:linux:linux_kernel:2.6.22 cpe:/o:ipcop:ipcop:2.0 cpe:/o:linux:linux_kernel:3.4 cpe:/o:linux:linux_kernel:4.9 Aggressive OS guesses: Android 7.1.2 (Linux 3.10) (96%), Linux 2.6.18 - 2.6.22 (94%), Linux 3.0 (92%), Linux 3.2 (92%), Tomato firmware (Linux 2.6.22) (88%), IPCop 2.0 (Linux 2.6.32) (87%), Linux 2.6.32 (87%), IPCop 2 firewall (Linux 3.4) (87%), Linux 4.9 (87%), Tiandy NVR (87%) No exact OS matches for host (test conditions non-ideal). Network Distance: 11 hops TRACEROUTE (using port 554/tcp) HOP RTT ADDRESS 1 0.20 ms 208.76.251.177 2 0.54 ms gw.mcom-colocationamerica.com (208.64.231.81) 3 0.65 ms 1.162.45.96-dedicated.multacom.com (96.45.162.1) 4 0.87 ms be5361.ccr42.lax01.atlas.cogentco.com (38.99.219.57) 5 12.69 ms be2932.ccr32.phx01.atlas.cogentco.com (154.54.45.161) 6 20.92 ms be3872.ccr22.elp02.atlas.cogentco.com (154.54.26.54) 7 33.53 ms be2668.ccr22.den01.atlas.cogentco.com (154.54.87.30) 8 33.89 ms be2402.rcr21.b006467-6.den01.atlas.cogentco.com (154.54.88.46) 9 33.93 ms 38.140.186.234 10 42.06 ms 192.168.255.249 11 33.82 ms 138.113.19.15 OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 562.69 seconds
Features
5 scans/day
Daily API Calls - 20 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is suitable for beginners who want to check if their host has any open ports accessible from the outside.
Lifetime
Features
10 000 scans/day
Daily API Calls - 100 000 request
Save log
Public scan
OSINT scan
Unlisted scan
Private scan
No Ads
Remove after scan
Remove scan result
Additional methods for scan
This option is best for professionals who need to test their host's open ports from an external source.
Billed Annually @ $45.00 - 50% discount